Applied Mechanics and Materials Vols. 701-702

Paper Title Page

Abstract: An integrated electricity information security monitoring platform is presented, electrical information security integrated real-time monitoring of the state power applied information security systems, security equipment, network equipment, network boundaries, desktop computers, to improve information security monitoring, early warning, emergency response and defense capabilities to protect IT hardware, software and network security, which can guarantee continuous, reliable and efficient operation.
947
Abstract: Cloud computing is a product of the development of the Internet of things, so it has the characteristics as the network does, namely dynamic, patulous and virtual. This paper studies the use of cloud computing in university employment information library. By understanding the definition, application characteristics and advantages of cloud computing, and considering the opportunities and challenges which we face in the issue of employment of college graduates, we try to dig deeper into the relationship between companies and graduates in order to build a "cloud" of labor market information, namely cloud computing database. The results show that with cloud computing we can fully meet the company by find the required graduates faster. Students can also find suitable jobs easier.
952
Abstract: The equipment maintenance in large marine ships may rely on Internet of Things to provide monitoring of equipment status instantly. The data volume of sensing data is huge as the number of equipments is large. It is critical to decrease the communication overhead of uploading sensing data for efficiently and timely monitoring. In this paper, we propose several coding algorithms by using data context that is modeled by our normal forms on the base of our observations. The communication efficiency is improved, which is justified by formal analysis and rigorous proof. We also propose several network plan policies for further improvement of the communication efficiency by using data context and cluster head deployment.
957
Abstract: A wireless data transmission system used to realize data transmission of ground penetrating radar (GPR) is designed. It including data receiver and sender overcomes the disadvantages of traditional GPR cable transmission system. STM32F407 chip and ATK-RM04 are core components of data sender. PC with a wireless network card is data receiver. System is designed with reference to C/S network model. Data receiver and sender are respectively developed with VC++ socket and RAW API of Lwip TCP/IP protocol stack. CP protocol is chosen as network transport protocol. Practical applications show that system can stably transmit data within 0m-20m and maximum loss rate is 0.005%. It is reliable and convenient for GPR’s application.
961
Abstract: This paper propose an idea of dynamic deploy and relevant algorithms. The first step of dynamic deployment is that it will forecast the security situation through grey forecast model. Then, the virtual honeypots will be changed by imitating the biology actions. Hence, the dynamic Honeynet has the ability of disguising according to the realtime intrusion. It improves the effect in confusing hackers and weakens the attack. The model and relevant algorithms are presented. The results of experiment show that dynamic deploy scheme better effect in deceiving hackers with lower cost compared to the static deploy scheme.
965
Abstract: The right measurement of network time delay is the basis of a good network service. With the research on the IEEE 1588 precision time synchronization protocol and MPLS (Multi-protocol Label Switching), a method to realize the network time delay measurement in the MPLS network is introduced. It is also pointed out that this method has very important significance for the rapid deployment of network and the network quality evaluation.
969
Abstract: The LMMSE equalization filter based on minimum mean square error (MMSE) criterion can effectively suppress the inter-symbol interference caused by multi-path and recover the orthogonality among the spreading codes. In this paper, LMMSE equalizer with 0.5chip level algorithm is studied in the downlink of the UTRA HSPA+ system and the simulation results show that the performance of algorithm with 0.5chip level is better than the algorithm with one chip level.
974
Abstract: Aim to the problem of code-division multiple-access (CDMA) with both multiple-access interference (MAI) and intersymbol interference (ISI) in dispersive channels of cellular mobile communication under urban architecture’s influence, low-complexity multiuser detection is proposed to suppress MAI and ISI jointly. This technique is considered to base on a blind linear filter detector with the subspace-based and auxiliary vector incorporated the desired user's signature waveform. It is showed that the performance of newly proposed detector outperforms the conventional detectors.
979
Abstract: Recently, indoor localization is essential to enable location-based services for many mobile and social network applications. Due to fluctuation of the wireless signal, the accuracy of a simple WiFi fingerprint-based localization is not high. In this paper, we first exploit Pedestrian Dead Reckoning (PDR) technology to overcome the problem of the wireless signal fluctuation, then propose a PDR-aided algorithm with WiFi fingerprint matching for indoor localization, which using the PDR technology aided indoor localization. Experiments show that our algorithm has better accuracy than other indoor localization methods.
989
Abstract: Passive Optical Network (PON) technology has been widely accepted as main broadband access which can satisfy the rapid increasing bandwidth requirements. With the expansion of the number of users, as well as the variation of application scenarios, traditional single-stage cascaded or two-stage cascaded PON system can no longer meet users’ demands. This paper proposed four multiple-stage cascaded PON topologies with different protection schemes. Reliability and cost for each topology are presented with theoretical analysis and numerical simulations.
994

Showing 181 to 190 of 272 Paper Titles